diff options
author | Jack Rosenthal <jrosenth@chromium.org> | 2022-06-27 15:22:19 -0600 |
---|---|---|
committer | Chromeos LUCI <chromeos-scoped@luci-project-accounts.iam.gserviceaccount.com> | 2022-07-01 02:20:05 +0000 |
commit | ce2cf92034ad8ff8ba0cbdca03213ff626175c38 (patch) | |
tree | 3dd0551f7d69044fc2853bc82455d21bb6e44987 | |
parent | 6474fb289097b416f34937521c098672dd74145e (diff) | |
download | chrome-ec-ce2cf92034ad8ff8ba0cbdca03213ff626175c38.tar.gz |
test/rsa2048-3.h: Format with clang-format
BUG=b:236386294
BRANCH=none
TEST=none
Change-Id: I0fb62300cf68bdebe4c424a3da2b48203a81b193
Signed-off-by: Jack Rosenthal <jrosenth@chromium.org>
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/ec/+/3730535
Reviewed-by: Jeremy Bettis <jbettis@chromium.org>
-rw-r--r-- | test/rsa2048-3.h | 20 |
1 files changed, 9 insertions, 11 deletions
diff --git a/test/rsa2048-3.h b/test/rsa2048-3.h index d1b15c15a4..a09f94ab87 100644 --- a/test/rsa2048-3.h +++ b/test/rsa2048-3.h @@ -13,7 +13,7 @@ * # dumpRSAPublicKey -pub key.pub | xxd -i */ const uint8_t rsa_data[] = { - 0x40, 0x00, 0x00, 0x00, 0x0f, 0x46, 0xe8, 0x2c, 0x11, 0x17, 0x38, 0xfd, + 0x40, 0x00, 0x00, 0x00, 0x0f, 0x46, 0xe8, 0x2c, 0x11, 0x17, 0x38, 0xfd, 0xef, 0xa2, 0xb5, 0x2d, 0x6d, 0x76, 0xe1, 0x70, 0x7d, 0x67, 0xb1, 0x9a, 0x18, 0x78, 0x90, 0xe2, 0xce, 0xa6, 0x81, 0xa0, 0x13, 0x37, 0xf2, 0x71, 0xf0, 0x44, 0x96, 0xaf, 0x52, 0x53, 0xd4, 0x23, 0x51, 0x19, 0xe5, 0xb0, @@ -65,18 +65,16 @@ BUILD_ASSERT(sizeof(*rsa_key) == sizeof(rsa_data)); /* SHA-256 sum to verify: * # sha256sum README | sed -e 's/\(..\)/0x\1, /mg' */ -const uint8_t hash[] = { - 0x6c, 0x5f, 0xef, 0x7f, 0x63, 0x1d, 0xb4, 0x35, 0x6c, 0xae, 0x8b, 0x2a, - 0x4e, 0xde, 0xc5, 0xeb, 0x11, 0xba, 0x1f, 0x44, 0x40, 0xb6, 0x3a, 0x52, - 0xf2, 0x70, 0xef, 0xee, 0x44, 0x4b, 0x57, 0x62 -}; +const uint8_t hash[] = { 0x6c, 0x5f, 0xef, 0x7f, 0x63, 0x1d, 0xb4, 0x35, + 0x6c, 0xae, 0x8b, 0x2a, 0x4e, 0xde, 0xc5, 0xeb, + 0x11, 0xba, 0x1f, 0x44, 0x40, 0xb6, 0x3a, 0x52, + 0xf2, 0x70, 0xef, 0xee, 0x44, 0x4b, 0x57, 0x62 }; /* Incorrect hash to test the negative case */ -const uint8_t hash_wrong[] = { - 0x61, 0x1b, 0xd2, 0x44, 0xc7, 0x18, 0xa7, 0x2d, 0x0f, 0x2d, 0x3d, 0x0f, - 0xe3, 0xb3, 0xc5, 0xe4, 0x12, 0xc2, 0x7b, 0x1e, 0x05, 0x2c, 0x6f, 0xad, - 0xc4, 0xac, 0x71, 0x55, 0xe8, 0x80, 0x5c, 0x38 -}; +const uint8_t hash_wrong[] = { 0x61, 0x1b, 0xd2, 0x44, 0xc7, 0x18, 0xa7, 0x2d, + 0x0f, 0x2d, 0x3d, 0x0f, 0xe3, 0xb3, 0xc5, 0xe4, + 0x12, 0xc2, 0x7b, 0x1e, 0x05, 0x2c, 0x6f, 0xad, + 0xc4, 0xac, 0x71, 0x55, 0xe8, 0x80, 0x5c, 0x38 }; /* Generate signature using futility: * # futility create key.pem |